Zobrazeno 1 - 10
of 112
pro vyhledávání: '"Yudi Prayudi"'
Publikováno v:
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), Vol 7, Iss 2, Pp 218-225 (2023)
Facial recognition is an essential aspect of conducting criminal action investigations. Captured images from the camera or the recording video can reveal the perpetrator's identity if their faces are deliberately or accidentally captured. However, ma
Externí odkaz:
https://doaj.org/article/882f0601c5e146fcb3dcdf0230aa56b2
Publikováno v:
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), Vol 7, Iss 2, Pp 208-217 (2023)
According to reports in 2021 by Kaspersky, requests for investigations into suspicious network activity, such as ARP Spoofing, which can result in sophisticated attacks, reached up to 22%. Several difficulties with examining network systems have been
Externí odkaz:
https://doaj.org/article/76341f462ca64071b3d85079a61e1a99
Autor:
Jasmine Erina Firdaus, Yudi Prayudi
Publikováno v:
Edusaintek, Vol 11, Iss 2 (2023)
Anak-anak mudah sekali untuk mengakses teknologi tersebut. Situs web menjadi salah satu teknologi yang sangat mudah untuk diakses oleh semua kalangan. Akan tetapi, kurangnya sebuah aplikasi yang ramah anak membuat para orang tua khawatir ketika anak-
Externí odkaz:
https://doaj.org/article/bc2a90109ef34892a8cb6805bb61c1be
Publikováno v:
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), Vol 6, Iss 6, Pp 1028-1036 (2022)
Cloud computing is a service system mechanism that businesses and organizations use to perform computerized and integrated transactions over computer networks. The service system must, of course, be”matched”with a”certain amount”of security.
Externí odkaz:
https://doaj.org/article/51d67f1d3dde4feaa3dda130f6bf6095
Publikováno v:
Jurnal Informatika, Vol 10, Iss 2, Pp 261-271 (2022)
Social Media, in addition to having a positive impact on society, also has a negative effect. Based on statistics, 95 percent of internet users in Indonesia use the internet to access social networks. Especially for young people, Instagram is more wi
Externí odkaz:
https://doaj.org/article/55cc27d7b2fa4c84b6ace639d775bf79
Publikováno v:
JISKA (Jurnal Informatika Sunan Kalijaga), Vol 8, Iss 1 (2023)
Facial recognition is a significant part of criminal investigations because it may be used to identify the offender when the criminal's face is consciously or accidentally recorded on camera or video. However, a majority of these digital photos have
Externí odkaz:
https://doaj.org/article/73d3692123664684b0c437e2e98a5564
Publikováno v:
Ilkom Jurnal Ilmiah, Vol 13, Iss 1, Pp 58-66 (2021)
Increasing number of information technology users allows possibility for crimes to take advantage of information technology to continue increasing either directly and indirectly. Criminals often use computer devices to commit crimes. This is a major
Externí odkaz:
https://doaj.org/article/4e54adf9bfad43c2829c37b8f805a815
Publikováno v:
JRST: Jurnal Riset Sains dan Teknologi, Vol 5, Iss 1, Pp 31-38 (2021)
Teknologi informasi di era saat ini menunjukkan perkembangan yang pesat khususnya dalam bidang komputer berbasis jaringan. Di sisi lain, terdapat beberapa oknum-oknum tertentu yang menyalahgunakan teknologi tersebut salah satunya dengan melakukan ser
Externí odkaz:
https://doaj.org/article/d36aa87e48ec42379c2d99eedcb8ca81
Publikováno v:
Jurnal Teknologi dan Manajemen Informatika, Vol 6, Iss 2, Pp 53-63 (2020)
Kejahatan komputer memiliki 2 jenis barang bukti, yaitu: bukti fisik dan bukti digital. Penyimpanan pada bukti fisik membutuhkan sebuah ruang khusus yang dapat menampung bukti fisik tersebut. Namun dibutuhkan sebuah sistem yang dapat menyimpan dan me
Externí odkaz:
https://doaj.org/article/4b1fb57c2cbb4d06acaee7ba01ed226a
Publikováno v:
Jurnal Informatika, Vol 8, Iss 2, Pp 225-233 (2020)
Audio merupakan salah satu barang bukti digital yang digunakan dalam cybercrime. Seringkali bahwa bukti audio ini membawa peran krusial untuk mengungkapkan adanya kasus kejahatan sehingga diperlukan proses analisis audio forensic. Audio tersebut beri
Externí odkaz:
https://doaj.org/article/f2978892e2a2433aa5369e4aafeb9406